Searched refs:peer (Results 151 - 175 of 205) sorted by relevance

123456789

/external/wpa_supplicant_8/wpa_supplicant/src/p2p/
H A Dp2p_i.h52 * If the peer was discovered based on an interface address (e.g., GO
58 * address of the peer.
155 u8 peer[ETH_ALEN]; member in struct:p2p_sd_query
218 * P2P_WAIT_PEER_CONNECT - Waiting peer in List for GO Neg
223 * P2P_WAIT_PEER_IDLE - Waiting peer idle for GO Neg
274 * go_neg_peer - Pointer to GO Negotiation peer
279 * invite_peer - Pointer to Invite peer
284 * last_p2p_find_oper - Pointer to last pre-find operation peer
296 * sd_peer - Pointer to Service Discovery peer
312 * sd_query_no_ack - The first peer (De
[all...]
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
295 " due to it being the first no-ACK peer in this search iteration",
443 * separately for each peer to avoid having to drop old
882 os_memcpy(q->peer, dst, ETH_ALEN);
/external/boringssl/src/ssl/
H A Dssl_lib.cc1133 // time out because the peer never received our close_notify. Report to
1988 int SSL_select_next_proto(uint8_t **out, uint8_t *out_len, const uint8_t *peer, argument
1994 // For each protocol in peer preference order, see if we support it.
1997 if (peer[i] == supported[j] &&
1998 OPENSSL_memcmp(&peer[i + 1], &supported[j + 1], peer[i]) == 0) {
2000 result = &peer[i];
2007 i += peer[i];
2011 // There's no overlap between our protocols and the peer's list.
/external/syslinux/gpxe/src/net/tcp/
H A Discsi.c1504 struct sockaddr *peer; local
1514 peer = va_arg ( tmp, struct sockaddr * );
1515 memcpy ( &iscsi->target_sockaddr, peer,
/external/boringssl/include/openssl/
H A Devp.h590 // EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation
591 // by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For
592 // example, this is used to set the peer's key in (EC)DH.) It returns one on
594 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
/external/boringssl/src/include/openssl/
H A Devp.h590 // EVP_PKEY_derive_set_peer sets the peer's key to be used for key derivation
591 // by |ctx| to |peer|. It should be called after |EVP_PKEY_derive_init|. (For
592 // example, this is used to set the peer's key in (EC)DH.) It returns one on
594 OPENSSL_EXPORT int EVP_PKEY_derive_set_peer(EVP_PKEY_CTX *ctx, EVP_PKEY *peer);
/external/iw/
H A Dinterface.c553 COMMAND(set, peer, "<MAC address>",
555 "Set interface WDS peer.");
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_drv_ops.h125 enum wnm_oper oper, const u8 *peer,
H A Dap_drv_ops.c707 const u8 *peer, u8 *buf, u16 *buf_len)
711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.h63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
/external/wpa_supplicant_8/src/ap/
H A Dap_drv_ops.h125 enum wnm_oper oper, const u8 *peer,
H A Dap_drv_ops.c707 const u8 *peer, u8 *buf, u16 *buf_len)
711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.h63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
/external/wpa_supplicant_8/wpa_supplicant/
H A Devents.c3176 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer);
3178 wpa_tdls_start(wpa_s->wpa, data->tdls.peer);
3180 wpa_drv_tdls_oper(wpa_s, TDLS_SETUP, data->tdls.peer);
3184 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer,
3188 data->tdls.peer);
3192 data->tdls.peer);
3253 ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer);
4439 ibss_rsn_stop(wpa_s->ibss_rsn, data->ibss_peer_lost.peer);
4509 wpa_mesh_notify_peer(wpa_s, data->mesh_peer.peer,
H A Dp2p_supplicant.h155 void wpas_p2p_remove_client(struct wpa_supplicant *wpa_s, const u8 *peer,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_drv_ops.h125 enum wnm_oper oper, const u8 *peer,
H A Dap_drv_ops.c707 const u8 *peer, u8 *buf, u16 *buf_len)
711 return hapd->driver->wnm_oper(hapd->drv_priv, oper, peer, buf,
706 hostapd_drv_wnm_oper(struct hostapd_data *hapd, enum wnm_oper oper, const u8 *peer, u8 *buf, u16 *buf_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h63 int (*tdls_oper)(void *ctx, int oper, const u8 *peer);
/external/python/cpython2/Lib/
H A Dftplib.py844 def parse229(resp, peer):
861 host = peer[0]
/external/python/cpython3/Lib/
H A Dftplib.py857 def parse229(resp, peer):
874 host = peer[0]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_privsep.c393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
295 " due to it being the first no-ACK peer in this search iteration",
443 * separately for each peer to avoid having to drop old
882 os_memcpy(q->peer, dst, ETH_ALEN);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_privsep.c393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);
/external/wpa_supplicant_8/src/p2p/
H A Dp2p_sd.c58 return NULL; /* peer does not support SD */
65 /* Use WSD only if the peer indicates support or it */
82 os_memcmp(q->peer, dev->info.p2p_device_addr, ETH_ALEN) ==
282 p2p_dbg(p2p, "No Listen/Operating frequency known for the peer "
295 " due to it being the first no-ACK peer in this search iteration",
443 * separately for each peer to avoid having to drop old
882 os_memcpy(q->peer, dst, ETH_ALEN);
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_privsep.c393 os_memcpy(data.auth.peer, auth->peer, ETH_ALEN);

Completed in 437 milliseconds

123456789